Sei sulla pagina 1di 1

Ethical Hacking Question Paper

Q.1: What is SSID?


Q.2: How would you describe the process of shared key authentication in wireless networks?
Q.3: Where is the password hashes are stored in Windows XP and Linux OS?
Q.4: How would you compare LM, NTLM hashes?
Q.5: How would you use different type of Keyloggers?
Q.6: How would you categorize password attacking techniques?
Q.7: Identify the different parts of WEP? Lets assume Data= 13, ICV =01 and KeyStream generated using the
WEP key and IV is 100110. Explain how the data will be encrypted, sent and decrypted using WEP.

Potrebbero piacerti anche